搜索资源列表
BER
- Ber for different digital modulation schemes
fpga_security
- The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provid
SDR
- Its a simple SDR to change modulation schemes
01InternetworingBasics
- This chapter works with the next six chapters to act as a foundation for the technology discussions that follow. In this chapter, some fundamental concepts and terms used in the evolving language of internetworking a
test53
- 可伸缩视频中的5_3小波变换。运动补偿时间滤波是一种有效的可伸缩视频编码方案,采用5 /3提升小波实现能进一步提高其编码性能-Scalable video in the wavelet transform 5_3. Time motion compensation filter is an effective scalable video coding schemes, using 5/3 lifting wavelet to achi
QC_codes
- Construct the short length of QC LDPC codes without girth 4 and girth 6-The Program to construct the short length of QC LDPC codes without girth 4 and girth 6 Copyright (C) Yang XIAO, Jun FAN, BJTU, July 26, 2007, E-
CFD
- 计算流体力学基本思想 Matlab实例分析 CFD实例分析-CFD Lax schemes for Euler Equation
TRUWB
- this file is mfile code for uwb simulation. TR modulation schemes have been proposed because of the ease of channel estimation in dense multipath channel.
CheckForUpdates
- Update programs schemes via HTTP, automatically with API Functions
10.1.1.21.6565
- Performance of 4- and 8-State TCM Schemes with Asymmetric 8-PSK in Fading Channels
OFDM_FDM_DAB_DSL_PSK_QAM_IFFT
- PERFORMANCE ANALYSIS OF OFDM Orthogonal Frequency-Division Multiplexing (OFDM) — essentially identical to Coded OFDM (COFDM) — is a digital multi-carrier modulation scheme, which uses a large number of closely-spaced
watermarkingbyDE
- image watermarking by using different expension including Tian s and alttar s schemes.
AudioCodecs-MPEG4AACIEEEcodingschemes
- Audio Codecs -MPEG4 AAC IEEE coding schemes document-Audio Codecs-MPEG4 AAC IEEE coding schemes document
OnDesignatedlyVerifiedNon-interactive)Watermarking
- On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is
FromWeaktoStrongWatermarking
- From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark withou
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encrypt
Modulate
- Modulate is a function written in matlab which creates a signal constellation with M points. The modulation schemes supported are BPSK , QPSK , PSK , QAM , APSK , HEX , or FSK -Modulate is a function written in matlab wh
6225_schematics
- 6225 SCHEMatics, some nokia schemes
HigherFDTD
- Higher order FDTD schemes , give the accurate idear to expand FDTD for higher order
comp_of_conv-and-turbo
- A Comparison of Convolutional and Turbo Coding Schemes For Broadband fixed wireless access(FWA) systems.